Search This Blog

Wednesday, March 03, 2010

Microsoft security exec suggests 'Net tax; VeriSign bullish on DNSSEC

Verisign: DNSSEC on track | RSA 2010: Cloud security announcements dominate already

Network World Security Alert

Forward this to a Friend >>>


Microsoft's Charney suggests 'Net tax to clean computers
How will we ever get a leg up on hackers who are infecting computers worldwide? Microsoft's security chief laid out several suggestions Tuesday, including a possible Internet usage tax to pay for the inspection and quarantine of machines. Read More


RESOURCE COMPLIMENTS OF: Cisco

Cisco AnyConnect Secure Mobility
Cisco AnyConnect Secure Mobility solution provides next-generation remote access with consistent policy enforcement for today's mobile workforce. Learn more now.

WEBCAST: St. Bernard

Get the Instruments You Need to Become an IT Security Hero
This online demo shows how you can quickly bullet-proof your internet security with the new iPrism 6.4 web filter, and you'll be entered to win one of the hottest music video games! Learn more

Verisign: DNSSEC on track
VeriSign is reporting no serious problems with its ongoing deployment of DNS Security Extensions (DNSSEC) on the Internet's root servers and on the top-level domain servers that it operates, including the systems that power the popular .com and .net domains. Read More

RSA 2010: Cloud security announcements dominate already
It's pouring in San Francisco but ironically the RSA Conference is already pointed toward clouds -- in this case cloud computing security. Read More

IdM products unveiled at RSA
Centrify, Imprivata and Courion among vendors announcing new products and releases at RSA Conference. Read More


WHITE PAPER: Tripwire

A Holistic Approach to Compliance Makes Business Sense
IT management has tremendous incentive to figure out a new, more effective and comprehensive approach to meeting information security and compliance goals. This webcast will explore those pain points, the solutions, and the best practices organizations should consider to make strategic information security an enabler of business value. Learn More!

Travel Security: What to Pack to Survive a Natural Disaster
Secure travel plans often consider kidnapping or terrorism. But what about natural events like the recent quakes in Haiti and Chile? Chris Falkenberg has advice on what travelers should pack for the best chance of surviving a disaster. Read More

Websites offered free anti-hijack scans
Web admins and owners are being offered a free service that will scan their sites for malware hijacks, alerting them automatically if malicious code is found. Read More

Cisco outlines new plan for securing mobile, cloud apps
Cisco on Monday outlined its security product-development strategy aimed at providing a new type of "always on" security protection for mobile devices as well as a way to establish controls over cloud-computing applications used by the enterprise. Cisco is calling the initiative its Secure Borderless Network architecture. Read More


WHITE PAPER: IBM NWW

Develop Effective user Management
With IBM, organizations can develop comprehensive solutions to help gain visibility into business continuity risks, achieve control over utilization of sensitive business assets and automate a variety of processes for managing access to critical assets and data. Read more

Digital Thieves Dominate Data Breaches
For the first time, hackers have become the biggest cause behind publicly reported data breaches, according to a recent report. Read More

Protect Data With On-the-Go Drive Encryption
This past January, the health organization Kaiser Permanente reported a theft of an external hard drive from an em­­ployee's car. The hard drive contained data on about 15,500 Northern California patients, including their full names, medical record numbers, and, in some cases, gender, dates of birth, and other info on treatment and care received at Kaiser (but not patients' social security numbers or financial data). Read More

Google Attack Based on Unpatched IE Flaw
In an announcement that made big news last month, Google said that it and numer­­ous other companies had been hit by successful hacker attacks. The hacker's means of access: A critical unpatched ("zero-day") hole in Internet Explorer. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Forrester Research and Network World want to hear from you!
We are collaborating to conduct an on-line-based study focused around data center strategy. The survey should take approximately 12 to 15 minutes to complete. This is both a confidential and anonymous survey and your results will only be used in aggregate. As a special thankyou, all respondents will receive a free copy of the resulting research report from Forrester – a $500 value! Thank you for taking the time to fill out the survey.

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. 15 books on Microsoft PerformancePoint business analytics available, too.

SLIDESHOWS

Videogame your way through the Olympics
If you're bored with (or inspired by) NBC's coverage of the games, there's always your PC or video game system that lets you feel like you're competing in these events.

The technology behind the Vancouver Olympic Games
Bell Canada is claiming the Vancouver 2010 Olympic network as the first IP-based converged network at any Olympic or Paralympic Games. It will be built to provide seamless telephone, wireless, radio and Internet communications services for fans, media, athletes and officials from around the world.

MOST-READ STORIES

  1. 7 most useful Firefox add-ons
  2. Should open source be an enemy of the state?
  3. Why trust a hotel chain that's had three breaches in a year?
  4. Topeka, Kansas shows Google it can grovel
  5. 5 things VMware must do to fend off Microsoft
  6. Microsoft: Don't press F1 key in Windows XP
  7. Q&A: Verizon's LTE road map for 2010 and beyond
  8. Cisco Nexus 5000's poor results in data center switching test
  9. 7 Android devices that aren't phones
  10. Force10 claims 10G Ethernet density lead

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: